Design and verification of the arm confidential compute architecture

X Li, X Li, C Dall, R Gu, J Nieh, Y Sait… - 16th USENIX Symposium …, 2022 - usenix.org
The increasing use of sensitive private data in computing is matched by a growing concern
regarding data privacy. System software such as hypervisors and operating systems are …

Refinement types: A tutorial

R Jhala, N Vazou - Foundations and Trends® in …, 2021 - nowpublishers.com
Refinement types enrich a language's type system with logical predicates that circumscribe
the set of values described by the type. These refinement predicates provide software …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

{VRASED}: A verified {Hardware/Software}{Co-Design} for remote attestation

IDO Nunes, K Eldefrawy, N Rattanavipanon… - 28th USENIX Security …, 2019 - usenix.org
Remote Attestation (RA) is a distinct security service that allows a trusted verifier (Vrf) to
measure the software state of an untrusted remote prover (Prv). If correctly implemented, RA …

Secure firmware updates for constrained iot devices using open standards: A reality check

K Zandberg, K Schleiser, F Acosta, H Tschofenig… - IEEE …, 2019 - ieeexplore.ieee.org
While the IoT deployments multiply in a wide variety of verticals, the most IoT devices lack a
built-in secure firmware update mechanism. Without such a mechanism, however, critical …

Jasmin: High-assurance and high-speed cryptography

JB Almeida, M Barbosa, G Barthe, A Blot… - Proceedings of the …, 2017 - dl.acm.org
Jasmin is a framework for developing high-speed and high-assurance cryptographic
software. The framework is structured around the Jasmin programming language and its …

RefinedC: automating the foundational verification of C code with refined ownership types

M Sammler, R Lepigre, R Krebbers… - Proceedings of the …, 2021 - dl.acm.org
Given the central role that C continues to play in systems software, and the difficulty of
writing safe and correct C code, it remains a grand challenge to develop effective formal …

A secure and formally verified Linux KVM hypervisor

SW Li, X Li, R Gu, J Nieh, JZ Hui - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Commodity hypervisors are widely deployed to support virtual machines (VMs) on
multiprocessor hardware. Their growing complexity poses a security risk. To enable formal …

Evercrypt: A fast, verified, cross-platform cryptographic provider

J Protzenko, B Parno, A Fromherz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present EverCrypt: a comprehensive collection of verified, high-performance
cryptographic functionalities available via a carefully designed API. The API provably …

Simple high-level code for cryptographic arithmetic: With proofs, without compromises

A Erbsen, J Philipoom, J Gross, R Sloan… - ACM SIGOPS Operating …, 2020 - dl.acm.org
We introduce an unusual approach for implementing cryptographic arithmetic in short high-
level code with machinechecked proofs of functional correctness. We further demonstrate …